★★★ Successfully Unlocked / Repaired / Flashed Phones by UnlockTool PLEASE POST HERE ★★★

GsmToto

Super Moderator
Jan 1, 2021
5,288
22,051
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting for HS-USB QDLoader 9008... COM3
Selected Model : Samsung M14 4G (BIT 6)
Code Name : SM-M145F | SM-M145F/DS (BIT6)
Operation : Erase FRP [1]
Authenticating... OK
Retrieving server data... OK [267.33 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 6
Reading software info... OK [super]
Model Name : SM-M145F_SWA_INS_QKEY0
Manufacturer : SAMSUNG
Build ID : M145FXXU6CXK5
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL
2025.02.19.0
Elapsed time : 17 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,288
22,051
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM29 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_water.bin [MT6765:9:1552] [Internal]
Vendor : XIAOMI
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : 13D196EC5144F56FAEFC4BF7BCA910AM
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 5900019B.36305330.733B0034.954A4188
Vendor : Samsung - Name : Y0S064 - Serial : 1095004987 - Rev : 0
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.25 GiB
Reading partition info... OK [56]
Reading device info... SKIP [EROFS]
Erasing FRP... OK

UNLOCKTOOL 2025.02.19.0
Elapsed time : 4 minutes 51 seconds
 

=-rebel-=

Moderator
Jan 22, 2020
1,338
1,086
Philippines
[PRELOADER] ERASE FRP Selected auth : SAMSUNG [1]
Phone must have battery inside!
Waiting for device... COM3 [BOOTROM:0E8D:0003]
Initializing usb... OK
Waiting for device... COM3 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_hs03s.bin [MT6765:9:1552] [Internal]
Vendor : SAMSUNG
Handshaking... OK
Reading hardware info... OK
Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000
Security Config : SCB SLA DAA
MEID : B809DB7CE4C2E86184D55F6A92548F6E
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
Storage : EMMC - CID : 52000115.41343650.C9D50042.E5A84CCC
Vendor : Samsung - Name : RP64AB - Serial : 1288489429 - Rev : 0
Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB
Reading partition info... OK [50]
Reading device info... OK [super]
Model Name : SM-A037F
Product Name : a03snnxx
Manufacturer : samsung
Platform : a03s
Android Version : 13
Security Patch : 2024-05-01
Build ID : TP1A.220624.014.A037FXXS6CXE2
Build : A037FXXS6CXE2
Build Date : Fri May 17 14:20:53 KST 2024
Code Name : SM-A037F
PDA : A037FXXS6CXE2
Connecting to device... OK
Erasing FRP... OK
UNLOCKTOOL 2025.03.01.0
Elapsed time : 27 seconds
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
5,288
22,051
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Waiting for HS-USB QDLoader 9008... COM5
Selected Model : Samsung S20 FE 5G (BIT-D)
Code Name : SM-G780G (BIT-D)
Operation : Erase FRP [1]
**Authenticating... OK
**Retrieving server data... OK [367,8 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM5
Connecting to device... OK
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
**Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576]
Reading partition map... OK - LU Count : 4
Reading software info... OK [super]
** Model Name : SM-G780G
** Product Name : r8qxx
** Manufacturer : samsung
** Platform : kona
** Android Version : 13
** Security Patch : 2024-09-01
** Build ID : TP1A.220624.014.G780GXXSCEXI7
** Build : G780GXXSCEXI1
** Build Date : Mon Aug 26 18:46:17 KST 2024
** Code Name : SM-G780G
** PDA : G780GXXSCEXI1
Erasing FRP... Read-Only
Switched to SMART Mode!
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2025.03.01.0
Elapsed time : 47 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,288
22,051
UK
Skype
gsmtoto
Sonork ID
100.1684601
[BROM] ERASE FRP Initializing usb... OK
Waiting for device... COM3 [BOOTROM:0E8D:0003]
Bypassing authentication... OK
Analyzing... preloader_ruby.bin [MT6877:9:868] [Internal]
Vendor : XIAOMI
Reading hardware info... OK
* Hardware : MT6877 [Dimensity 900|920|1080|7050] 0959 8A00 CA00 0000
* Security Config : SCB SLA DAA
* MEID : D1699B644A47F1EC7DAC4E6FD0D0B87B
Sending Download-Agent [1]... OK
Syncing with device... OK
Booting device... OK
Syncing with DA... OK
**Storage : UFS - FWVer : A003 - CID : H9QT1G6DN6X132
**Vendor ID : SKHynix [0x1AD]
**UFS: LU0 Size : 4 MiB - LU1 Size : 4 MiB - LU2 Size : 238.34 GiB
Reading partition info... OK [77]
Reading device info... SKIP [EROFS]
Erasing FRP... OK
UNLOCKTOOL 2025.03.01.0
Elapsed time : 26 seconds
 

GsmToto

Super Moderator
Jan 1, 2021
5,288
22,051
UK
Skype
gsmtoto
Sonork ID
100.1684601
[EDL] ERASE FRP Waiting for HS-USB QDLoader 9008... COM3
Selected Model : Oppo A3 / A3X
Code Name : CPH2641/ CPH2669
Operation : Erase FRP [4]
Authenticating... OK
Retrieving server data... OK [273.62 KiB]
Initializing data... OK
Waiting for HS-USB QDLoader 9008... COM3
Connecting to device... OK
Handshaking... OK
Reading bootloader info... OK
Serial : 376781800 SoC : [Snapdragon 662] [SM6115] [0x0014D0E1]
OEM : Oppo/Realme/Oneplus [0x0051] Model : Unknown [0x0000]
PK_HASH[0] : 49445E14621312DFECCD4389F267E6B7
PK_HASH[1] : 1674DDD36B1BC41D1F605AA991D14AD6
Writing flash programmer... OK
Connecting to flash programmer... OK
Configuring device... OK
Firehose config : eMMC [Sector:512] [Target:0] [Host:1048576]
Erasing FRP... OK
Rebooting... OK
UNLOCKTOOL 2025.03.07.0
Elapsed time : 49 seconds
 
Top